To prevent data breaches, organizations must prioritize data governance; there’s a big collaboration opportunity between the CISO and CDO roles in this endeavor.
data privacy
An in-depth look at automated vulnerability scanning within financial software, how it works, as well as top tools and best practices to get the job done.
How organizations can balance their expanding use of AI against the need to manage the data governance process — while increasing the value and velocity of data.
As a data-driven CIO, you can deliver value to your company in several critical areas that drive business impact; manufacturing CIO Kenny Mullican explains how.
Bill Doerrfeld explains how to effectively manage diverse, geographically specific data governance and compliance standards.
Wayne Sadin explains how data governance came to be so messy, and how strategic use of cloud and cybersecurity can impose order.
In this Cloud Wars Expo Industry Cloud Battleground Moment, Carrie Tharp explains how Google Cloud emphasizes security and privacy in the hospitality industry.
In ep. 29, Kieron Allen explains why a digital trust strategy is essential for brands and describes how a company can successfully implement one.
In this Cloud Wars Expo Industry Cloud Battleground moment, Workday Americas CTO Joe Wilson explains the unparalleled ways that the cloud provider meets the security needs of its customers.
In this Cloud Wars Horizon Demo Day moment, Ronak Mathur and Tom Smith discuss how automation was essential when rolling out vaccines and how it enabled patients to access certifications for vaccines sooner.
In this Cloud Wars Horizon Demo Day moment, Brent Davis, Strategy — Technical Partnerships, Okera, details how the company utilizes Snowflake’s database to write and manage data policies that enable efficient operations.
After a breach, you’ll need help from an incident response team, either in-house or third party. Frank explains how and what to look for.
In Ep. 6 of the Acceleration Economy Minute, Kieron Allen explains why legal representation is needed for those who wish to succeed in the acceleration economy.
By distributing AI computation to local sensors and devices where the data is actually generated, Edge AI powers real-time capabilities for everything from medical devices to self-driving cars to energy grid monitoring, as Toni explains.
From victim and media notification to legal liabilities and government considerations, the many issues that arise after a security breach are more easily addressed with the help of a lawyer. Frank explains why.
In this Data Modernization Battleground moment, Chris says that cybersecurity professionals must understand data inventory, how businesses are using data, and who has access to data.
As Bill explains, continuous delivery/deployment scenarios require special and specific security — especially in industries that handle sensitive personal and financial data.
In this Cloud Wars Expo Moment, Joe Wilson, CTO for Americas, Workday, explains the never-ending need for privacy and security in the hospitality industry, and why the company offers five core principles in its technologies.
In Ep. 9 of the Cutting Edge podcast, Leonard Lee explains why customers have a growing concern about privacy at the edge, and offers some intriguing solutions to the issue that edge computing can provide.
From interoperability and immutability to security and sustainability, there are many myths around standardized virtual spaces in the Metaverse. Kieron clarifies what’s fact and what’s fiction.